Analysis
-
max time kernel
57s -
max time network
71s -
platform
windows7_x64 -
resource
win7 -
submitted
07-07-2020 09:27
Static task
static1
Behavioral task
behavioral1
Sample
PEDIDO DE OFERTA 07-07-2020·pdf.exe
Resource
win7
General
-
Target
PEDIDO DE OFERTA 07-07-2020·pdf.exe
-
Size
603KB
-
MD5
537b024fe163c326ed10f7fbc3f38146
-
SHA1
57191d4a826280a11aadc5fd894542a6926fc702
-
SHA256
b5cd221eb80d87f801573a029db972b0e71d4e61d4fa5c17fb7fc12c45dbe518
-
SHA512
0bd8fd0e77244becfe22302fbb3f06b6be797b26b66b9b89cb466ebb066892609884b8222dd377f155246b87b1a1acdabbb036f0fe72ebed65f3fef2a5cd5f89
Malware Config
Extracted
lokibot
http://195.69.140.147/.op/cr.php/Gi4uJRts3jTJM
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
PEDIDO DE OFERTA 07-07-2020·pdf.exepid process 1456 PEDIDO DE OFERTA 07-07-2020·pdf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
PEDIDO DE OFERTA 07-07-2020·pdf.exedescription pid process target process PID 1456 wrote to memory of 1488 1456 PEDIDO DE OFERTA 07-07-2020·pdf.exe PEDIDO DE OFERTA 07-07-2020·pdf.exe PID 1456 wrote to memory of 1488 1456 PEDIDO DE OFERTA 07-07-2020·pdf.exe PEDIDO DE OFERTA 07-07-2020·pdf.exe PID 1456 wrote to memory of 1488 1456 PEDIDO DE OFERTA 07-07-2020·pdf.exe PEDIDO DE OFERTA 07-07-2020·pdf.exe PID 1456 wrote to memory of 1488 1456 PEDIDO DE OFERTA 07-07-2020·pdf.exe PEDIDO DE OFERTA 07-07-2020·pdf.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
PEDIDO DE OFERTA 07-07-2020·pdf.exepid process 1456 PEDIDO DE OFERTA 07-07-2020·pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PEDIDO DE OFERTA 07-07-2020·pdf.exedescription pid process target process PID 1456 set thread context of 1488 1456 PEDIDO DE OFERTA 07-07-2020·pdf.exe PEDIDO DE OFERTA 07-07-2020·pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
PEDIDO DE OFERTA 07-07-2020·pdf.exedescription pid process Token: SeDebugPrivilege 1488 PEDIDO DE OFERTA 07-07-2020·pdf.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
PEDIDO DE OFERTA 07-07-2020·pdf.exepid process 1488 PEDIDO DE OFERTA 07-07-2020·pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PEDIDO DE OFERTA 07-07-2020·pdf.exe"C:\Users\Admin\AppData\Local\Temp\PEDIDO DE OFERTA 07-07-2020·pdf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\PEDIDO DE OFERTA 07-07-2020·pdf.exe"C:\Users\Admin\AppData\Local\Temp\PEDIDO DE OFERTA 07-07-2020·pdf.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: RenamesItself
PID:1488